Last modified by Denisa Wernerová on 03.08.2023 12:55

From version 9.1
edited by Denisa Wernerová
on 29.08.2017 12:45
Change comment: Renamed back-links.
To version 10.1
edited by Denisa Wernerová
on 03.08.2023 12:55
Change comment: Imported from XAR

Summary

Details

Page properties
Content
... ... @@ -1,10 +8,3 @@
1 -{{info}}
2 -(% style="font-size: 18px;font-weight: bold;" %)The last logged fraudulent messages:(%%)
3 -
4 -* 28.03.2017 ICT služby!
5 -
6 -{{/info}}
7 -
8 8  **Do not try to fight phishing on their own, because in many cases it can disrupt the already established and proven practices of our security team at the Technical University.**
9 9  
10 10  **If you read the message with many hours delay (more than about 12 hours), usually already we know about this incident and there is no need for us to report news!** Please forward fraudulent messages to abuse@vsb.cz immediately after delivery to your inbox. Thank you for your understanding.
... ... @@ -56,7 +56,7 @@
56 56  {{id name="how-to-help"/}}
57 57  **How you can help**
58 58  
59 -* Forward to us every suspicious message by email on [[abuse@vsb.cz>>path:mailto:abuse@vsb.cz]] and attach also the source code of the message (see guides for [[Outlook 2010>>uzivatel.email.postovni-klienti.outlook.outlook-dalsi-navody.2010-zdroj-kod.WebHome]], [[Outlook 2007>>uzivatel.email.postovni-klienti.outlook.outlook-dalsi-navody.2007-zdroj-kod.WebHome]], [[Thunderbird>>doc:uzivatel.email.postovni-klienti.mozilla-dalsi-navody.thund-zdroj-kod.WebHome]], [[Roundcube>>uzivatel.email.roundcube.zdrojovy-kod.WebHome]], [[Office 365>>uzivatel.email.office365-mail.office365-zdroj-kod.WebHome]]).
52 +* Forward to us every suspicious message by email on [[abuse@vsb.cz>>path:mailto:abuse@vsb.cz]] and attach also the source code of the message (see guides for [[Outlook 2016>>doc:uzivatel.email.exchange.outlook-2016.outlook2016-zdrojovy-kod.WebHome]], [[Thunderbird>>doc:uzivatel.email.postovni-klienti.mozilla-dalsi-navody.thund-zdroj-kod.WebHome]], [[Roundcube>>uzivatel.email.roundcube.zdrojovy-kod.WebHome]], [[Office 365>>uzivatel.email.office365-mail.office365-zdroj-kod.WebHome]]).
60 60  
61 61  {{id name="protect-account"/}}
62 62  **What can you do to protect your account security**
... ... @@ -78,38 +78,25 @@
78 78  * View message head detail in the email client and check addresses. From and Reply-to. Don´t tell your login and password by email.
79 79  
80 80  **Example No. 1**
74 +\\[[[[image:phishing.gif||style="vertical-align:middle"]]>>attach:phishing.gif]]
81 81  
82 -[[[[image:phishing.gif||style="vertical-align: middle;" width="680"]]>>attach:phishing.gif]]
83 -
84 84  
85 85  **Example No. 2**
86 -
87 -[[[[image:phishing_2.gif||style="vertical-align: middle;" width="439"]]>>attach:phishing_2.gif]]
88 -
89 -**Example No. 3**
90 -
91 -[[[[image:phishing_3.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_3.png]]
78 +\\[[[[image:phishing_2.gif||style="vertical-align:middle"]]>>attach:phishing_2.gif]]
79 +\\**Example No. 3**
80 +\\[[[[image:phishing_3.png||style="vertical-align:middle"]]>>attach:phishing_3.png]]
92 92  **Example No. 4**
93 -
94 -[[[[image:phishing_4.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_4.png]]
82 +\\[[[[image:phishing_4.png||style="vertical-align:middle"]]>>attach:phishing_4.png]]
95 95  
96 96  **Example No. 5**
97 -
98 -[[[[image:phishing_5.png||style="vertical-align: middle;" width="496"]]>>attach:phishing_5.png]]
99 -
100 -**Example No. 6**
101 -
102 -[[[[image:phishing_6.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_6.png]]
85 +\\[[[[image:phishing_5.png||style="vertical-align:middle"]]>>attach:phishing_5.png]]
86 +\\**Example No. 6**
87 +\\[[[[image:phishing_6.png||style="vertical-align:middle"]]>>attach:phishing_6.png]]
103 103  
104 104  **Example No. 7**
90 +\\[[[[image:phishing_7.png||style="vertical-align:middle"]]>>attach:phishing_7.png]]
91 +\\**Example No. 8**
92 +\\[[[[image:phishing_8.png||style="vertical-align:middle"]]>>attach:phishing_8.png]]
93 +\\**Example No. 9**
94 +\\[[[[image:phishing_9.png||style="vertical-align:middle"]]>>attach:phishing_9.png]]
105 105  
106 -[[[[image:phishing_7.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_7.png]]
107 -
108 -**Example No. 8**
109 -
110 -[[[[image:phishing_8.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_8.png]]
111 -
112 -**Example No. 9**
113 -
114 -[[[[image:phishing_9.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_9.png]]
115 -\\